A SOC receives several alerts indicating user accounts are connecting to the company’s identity provider through non-secure communications. User credentials for accessing sensitive, business-critical systems could be exposed. Which of the following logs should the SOC use when determining malicious intent?
linkmonkey239
Highly Voted 5 months, 2 weeks agoSusan4041
Most Recent 3 weeks, 2 days agozecomeia_007
5 months, 2 weeks agoCimoooooo
5 months, 2 weeks agoChopSNap
5 months, 3 weeks ago